Tweetovi

Blokirali ste korisnika/cu @sgirenko

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sgirenko

  1. proslijedio/la je Tweet
    21. sij
    Poništi
  2. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  3. proslijedio/la je Tweet
    18. lis 2019.

    checkm8-arduino PoC - the checkm8 port for Arduino and USB Host Shield.

    Poništi
  4. proslijedio/la je Tweet
    15. lis 2019.

    Eaphammer v1.9.0 - Targeted Evil Twin Attacks Against WPA2-Enterprise Networks

    Poništi
  5. proslijedio/la je Tweet

    Do not allow people to kill the ideas that you genuinely care about

    Poništi
  6. proslijedio/la je Tweet
    13. lip 2019.

    Intensio-Obfuscator - Obfuscate A Python Code 2.X And 3.X

    Poništi
  7. proslijedio/la je Tweet
    23. svi 2019.

    dsync - IDAPython plugin that synchronizes disassembler and decompiler views.

    Poništi
  8. proslijedio/la je Tweet
    2. tra 2019.
    Poništi
  9. proslijedio/la je Tweet
    17. ožu 2019.

    Reverse engineering with Ghidra : Breaking an embedded firmware encryption scheme :

    Poništi
  10. proslijedio/la je Tweet
    16. ožu 2019.
    Tweet je nedostupan.
    Poništi
  11. proslijedio/la je Tweet
    16. ožu 2019.

    1of x: BEST analysis of what really is happening on the issue from my brother in law , who’s a pilot, software engineer & deep thinker. Bottom line don’t blame software that’s the band aid for many other engineering and economic forces in effect.👇🎖🤔

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    15. velj 2019.

    . has been fuzzing HyperV and we've just released his write up and tooling

    Poništi
  13. proslijedio/la je Tweet
    12. velj 2019.

    In response to 's recent MikroTik tweet, I put some of my RouterOS bug hunting experience in writing:

    Poništi
  14. proslijedio/la je Tweet
    31. sij 2019.

    We are paying $100,000++ for MikroTik exploits leading to pre-auth RCE, or auth. bypass, or credentials disclosure. Target archs are: X86, ARM, MIPS. As always, we pay using Bitcoin/Monero or bank transfers. Offer valid for one month. Contact us:

    Poništi
  15. proslijedio/la je Tweet
    27. sij 2019.

    Interested in Hyper-V Internals? Read Part 2 of my continuing series on "Writing a Hyper-V "Bridge" for Fuzzing" as we get into the guts of hypercalls: with sample code and more!

    Poništi
  16. proslijedio/la je Tweet
    10. sij 2019.
    Poništi
  17. proslijedio/la je Tweet
    5. sij 2019.

    Symbols for Windows targets in applepie are now automatically downloaded and parsed from the symbol store as they are observed. No more manual symbol copying, no more worries about naming collisions.

    Poništi
  18. proslijedio/la je Tweet
    6. sij 2019.

    Tool release: Universal Phishing Reverse Proxy "Modlishka" (2FA support)

    Poništi
  19. proslijedio/la je Tweet
    2. stu 2018.
    Poništi
  20. proslijedio/la je Tweet
    2. stu 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·